Searched refs:updates (Results 1 - 25 of 58) sorted by relevance

123

/macosx-10.10.1/Security-57031.1.35/Security/include/security_utilities/
H A Dkq++.cpp45 unsigned KQueue::operator () (const KEvent *updates, unsigned updateCount, argument
48 int rc = ::kevent64(mQueue, updates, updateCount, events, eventCount, 0, timeout);
H A Dkq++.h46 unsigned operator () (const KEvent *updates, unsigned updateCount, KEvent *events, unsigned eventCount,
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_utilities/lib/
H A Dkq++.cpp45 unsigned KQueue::operator () (const KEvent *updates, unsigned updateCount, argument
48 int rc = ::kevent64(mQueue, updates, updateCount, events, eventCount, 0, timeout);
H A Dkq++.h46 unsigned operator () (const KEvent *updates, unsigned updateCount, KEvent *events, unsigned eventCount,
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/
H A DSecItemPriv.h288 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error);
289 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error);
290 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecItemPriv.h288 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error);
289 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error);
290 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecItemPriv.h288 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error);
289 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error);
290 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSShared/
H A Ddnsextd.conf10 // dynamic zone that will be accepting Wide-Area Bonjour DNS updates.
23 // network, you might allow anyone to perform updates. To do that, you just
24 // permit any and all updates coming from dnsextd on the same machine:
30 // you'll want to limit updates to only users with keys. For example,
32 // perform updates in your dynamic zone, like this:
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecItemPriv.h339 CFArrayRef _SecKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error);
340 CFArrayRef _SecKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error);
341 CFArrayRef _SecKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/
H A DSOSTransport.h9 CF_RETURNS_RETAINED CFMutableArrayRef SOSTransportDispatchMessages(SOSAccountRef account, CFDictionaryRef updates, CFErrorRef *error);
H A DSOSTransport.c201 static void showWhatWasHandled(CFDictionaryRef updates, CFMutableArrayRef handledKeys) { argument
206 CFDictionaryForEach(updates, ^(const void *key, const void *value) {
216 secnotice("updates", "Updates [%ld]: %@\n", CFDictionaryGetCount(updates), updateStr);
217 secnotice("updates", "Handled [%ld]: %@\n", CFArrayGetCount(handledKeys), handledKeysStr);
218 // secnotice("updates", "Updates: %@\n", updates);
219 // secnotice("updates", "Handled: %@\n", handledKeys);
226 CFMutableArrayRef SOSTransportDispatchMessages(SOSAccountRef account, CFDictionaryRef updates, CFErrorRef *error){ argument
230 if(CFDictionaryContainsKey(updates, kSOSKVSAccountChangedKe
[all...]
H A DSOSTransportCircleKVS.c14 static bool SOSTransportCircleKVSUpdateRetirementRecords(SOSTransportCircleKVSRef transport, CFDictionaryRef updates, CFErrorRef* error);
124 static bool SOSTransportCircleKVSUpdateRetirementRecords(SOSTransportCircleKVSRef transport, CFDictionaryRef updates, CFErrorRef* error){ argument
127 if (SOSTransportCircleKVSUpdateKVS((SOSTransportCircleRef)transport, updates, &updateError)){
131 CFSTR("update parameters key failed [%@]"), updates);
H A DSOSAccount.h132 void SOSTransportEachMessage(SOSAccountRef account, CFDictionaryRef updates, CFErrorRef *error);
177 bool SOSAccountHandleParametersChange(SOSAccountRef account, CFDataRef updates, CFErrorRef *error);
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/CKBridge/
H A DSOSCloudKeychainClient.h100 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateKeyParameter(CFDictionaryRef updates);
101 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateCircle(CFDictionaryRef updates);
102 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateMessage(CFDictionaryRef updates);
H A DSOSCloudKeychainClient.c591 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateKeyParameter(CFDictionaryRef updates) argument
596 result = ((CloudItemsChangedBlock)cTransportRef->itemsChangedBlock)(updates);
600 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateCircle(CFDictionaryRef updates) argument
605 result = ((CloudItemsChangedBlock)cTransportRef->itemsChangedBlock)(updates);
609 CF_RETURNS_RETAINED CFArrayRef SOSCloudKeychainHandleUpdateMessage(CFDictionaryRef updates) argument
614 result = ((CloudItemsChangedBlock)cTransportRef->itemsChangedBlock)(updates);
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/
H A DSOSCloudCircleServer.h76 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateKeyParameter(CFDictionaryRef updates);
77 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateCircle(CFDictionaryRef updates);
78 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateMessage(CFDictionaryRef updates);
H A DSecItemServer.h49 CF_RETURNS_RETAINED CFArrayRef _SecServerKeychainSyncUpdateKeyParameter(CFDictionaryRef updates, CFErrorRef *error);
50 CF_RETURNS_RETAINED CFArrayRef _SecServerKeychainSyncUpdateCircle(CFDictionaryRef updates, CFErrorRef *error);
51 CF_RETURNS_RETAINED CFArrayRef _SecServerKeychainSyncUpdateMessage(CFDictionaryRef updates, CFErrorRef *error);
H A DSOSCloudCircleServer.c527 secnotice("updates", "Requesting Ensure Peer Registration.");
559 secerror("Error handling updates: %@", error);
759 secnotice("updates", "Setting credentials for %@", user_label); // TODO: remove this notice
765 secnotice("updates", "EnsureFreshParameters/SOSAccountAssertUserCredentials error: %@", *block_error);
1113 secnotice("updates", "Request for registering peers");
1142 secnotice("updates", "SOSAccountSyncWithAllPeers failed because device is locked; letting CloudKeychainProxy know");
1166 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateKeyParameter(CFDictionaryRef updates)
1170 (account) ? (result = SOSCloudKeychainHandleUpdateKeyParameter(updates)) : (result = CFArrayCreateMutableForCFTypes(kCFAllocatorDefault));
1174 CF_RETURNS_RETAINED CFArrayRef SOSCCHandleUpdateCircle(CFDictionaryRef updates)
1178 (account) ? (result = SOSCloudKeychainHandleUpdateKeyParameter(updates))
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/Regressions/
H A DSOSTransportTestTransports.c21 static void SOSTransportMessageTestAddBulkToChanges(SOSTransportMessageTestRef transport, CFDictionaryRef updates);
38 static void SOSTransportCircleTestAddBulkToChanges(SOSTransportCircleTestRef transport, CFDictionaryRef updates);
349 static void SOSTransportCircleTestAddBulkToChanges(SOSTransportCircleTestRef transport, CFDictionaryRef updates){ argument
352 transport->changes = CFDictionaryCreateMutableCopy(kCFAllocatorDefault, CFDictionaryGetCount(updates), updates);
356 CFDictionaryForEach(updates, ^(const void *key, const void *value) {
396 __unused static bool SOSTransportCircleTestUpdateRetirementRecords(SOSTransportCircleTestRef transport, CFDictionaryRef updates, CFErrorRef* error){ argument
399 if (SOSTransportCircleTestSendChanges((SOSTransportCircleTestRef)transport, updates, &updateError)){
403 CFSTR("update parameters key failed [%@]"), updates);
536 static void SOSTransportMessageTestAddBulkToChanges(SOSTransportMessageTestRef transport, CFDictionaryRef updates){ argument
[all...]
/macosx-10.10.1/PowerManagement-494.1.2/pmconfigd/
H A DPMAssertionLog.c520 CFMutableArrayRef updates = NULL; local
592 updates = CFArrayCreateMutable(NULL, 0, &kCFTypeArrayCallBacks);
593 if (updates == NULL) {
601 CFArrayAppendArray(updates, activity.log, range);
614 CFArrayAppendArray(updates, activity.log, range);
624 serializedLog = CFPropertyListCreateData(0, updates,
644 if (updates)
645 CFRelease(updates);
H A DBatteryTimeRemaining.c83 // log of previous battery updates, maintained as ring buffer
1849 CFMutableArrayRef updates = NULL; local
1857 updates = CFArrayCreateMutable(NULL, 0, &kCFTypeArrayCallBacks);
1858 if (updates == NULL) {
1892 CFArrayAppendValue(updates, entry);
1906 return updates;
1913 vm_offset_t *updates,
1923 *updates = NULL; *updates_len = 0;
1964 vm_allocate(mach_task_self(), (vm_address_t *)updates, *updates_len, TRUE);
1965 if (*updates
1909 _io_ps_copy_chargelog( mach_port_t server __unused, audit_token_t token, double ts, vm_offset_t *updates, mach_msg_type_number_t *updates_len, int *rc) argument
[all...]
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/include/dns/
H A Dclient.h111 dns_clientupdatestate_prepare, /*%< no updates have been sent */
112 dns_clientupdatestate_sent, /*%< updates were sent, no response */
488 dns_namelist_t *updates, isc_sockaddrlist_t *servers,
494 dns_namelist_t *updates, isc_sockaddrlist_t *servers,
499 * Perform DNS dynamic update for 'updates' of the 'rdclass' class with
502 * 'updates' are a list of names with associated RRsets to be updated.
505 * the prerequisites of the updates. This is optional and can be NULL, in
508 * Both 'updates' and 'prerequisites' must be constructed as specified in
514 * with the first name in prerequisites or updates.
554 *\li 'updates' !
[all...]
/macosx-10.10.1/vim-55/runtime/syntax/
H A Ddebchangelog.vim22 syn match debchangelogTarget contained "\v %(frozen|unstable|%(testing|%(old)=stable)%(-proposed-updates|-security)=|experimental|%(etch|lenny)-%(backports|volatile)|%(dapper|hardy|jaunty|karmic|lucid|maverick)%(-%(security|proposed|updates|backports|commercial|partner))=)+"
/macosx-10.10.1/Security-57031.1.35/Security/sec/ipc/
H A Dserver.c474 CFDictionaryRef updates = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error); local
475 if (updates) {
476 CFArrayRef result = _SecServerKeychainSyncUpdateKeyParameter(updates, &error);
480 CFReleaseNull(updates);
485 CFDictionaryRef updates = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error); local
486 if (updates) {
487 CFArrayRef result = _SecServerKeychainSyncUpdateCircle(updates, &error);
491 CFReleaseNull(updates);
496 CFDictionaryRef updates = SecXPCDictionaryCopyDictionary(event, kSecXPCKeyQuery, &error); local
497 if (updates) {
[all...]
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/servers/slapd/
H A Dpasswd.c411 authPolicyAllowed = APAuthenticationAllowed(userpolicyinfodict, true, &cferr, ^(CFArrayRef keys){ return odusers_accountpolicy_retrievedata(&policyData, keys, &op->o_conn->c_sasl_dn); }, ^(CFDictionaryRef updates){ odusers_accountpolicy_updatedata( updates, &op->o_conn->c_sasl_dn ); });
425 ^(CFDictionaryRef updates){ odusers_accountpolicy_updatedata( updates, &op->o_req_dn ); });

Completed in 250 milliseconds

123